Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Computer Crime Computer System - 1,122 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

A young man sits illuminated only by the light of a computer screen. His fingers dance across the keyboard. While it appears that he is only word processing or playing a game, he may be committing a felony. In the state of Connecticut, computer crime is defined as: 53 a- 251. Computer Crime (a) Defined. A person commits computer crime when he violates any of the provisions of this section. (b) Unauthorized access to a computer system. (1) A person is guilty of the computer crime of unauthorized access to a computer system when, knowing that he is not authorized to do so, he accesses or causes the be accessed any computer system without authorization... (c) Theft of computer services.

A person is guilty of the computer crime o f theft of computer services when he accesses or causes to be accessed or otherwise uses or causes to be used a computer system with the intent to obtain unauthorized computer services. (d) Interruption of computer services. A person is guilty of the computer crime of interruption of computer services when he, without authorization, intentionally or recklessly disrupts or degrades or causes the disruption or degradation of computer services or denies or causes the denial of computer services to an authorized user of a computer system. (e) Misuse of computer system information. A person is guilty of the computer crime of misuse of computer system information when: (1) As a result of his accessing or causing to be accessed a computer system, he intentionally makes or causes to be made an unauthorized display, use, disclosure or copy, in any form, of data residing in, communicated by or produced by a computer system. Penalties for committing computer crime range from a class B misdemeanor to a class B felony. The severity of the penalty is determined based on the monetary value of the damages inflicted. (2) The law has not always had much success stopping computer crime.

In 1990 there was a nationwide crackdown on illicit computer hackers, with arrests, criminal charges, one dramatic show-trial, several guilty pleas, and huge confiscations of data and equipment all over the USA. The Hacker Crackdown of 1990 was larger, better organized, more deliberate, and more resolute than any previous efforts. The U. S. Secret Service, private telephone security, and state and local law enforcement groups across the country all joined forces in a determined attempt to break the back of America's electronic underground. It was a fascinating effort, with very mixed results.

In 1982, William Gibson coined the term 'Cyberspace'. Cyberspace is defined as 'the 'place' where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk... The place between the phones. The indefinite place out there. ' (1, p. 1) The words 'community' and 'communication's hare the same root.

Wherever one allows many people to communicate, one creates a community. "Cyberspace" is as much of a community as any neighborhood or special interest group. People will fight more to defend the communities that they have built then they would fight to protect themselves. This two-sided fight truly began when the AT& T telephone network crashed on January 15, 1990. The crash occurred due to a small bug in AT& T's own software. It began with a single switching station in Manhattan, New York, but within ten minutes the domino effect had brought down over half of AT& T's network. The rest was overloaded, trying to compensate for the overflow.

This crash represented a major corporate embarrassment. Sixty thousand people lost their telephone service completely. During the nine hours of effort that it took to restore service, some seventy million telephone calls went uncompleted. Because of the date of the crash, Martin Luther King Day (the most politically touchy holiday), and the absence of a physical cause of the destruction, AT& T did not find it difficult to rouse suspicion that the network had not crashed by itself- that it had been crashed, intentionally. By people the media has called hackers. Hackers define themselves as people who explore technology.

If that technology takes them outside of the boundaries of the law, they will do very little about it. True hackers follow a 'hacker's ethic', and never damage systems or leave electronic 'footprints' where they have been. Crackers are hackers who use their skills to damage other people's systems or for personal gain. These people, mistakenly referred to as hackers by the media, have been sensationalized in recent years. Software pirates, or warez dealers, are people who traffic in pirated software (software that is illegally copied and distributed). These people are usually looked down on by the more technically sophisticated hackers and crackers.

Another group of law-breakers that merit mentioning are the phreaks. Telephone phreaks are people that experiment with the telephone network. Their main goal is usually to receive free telephone service, through the use of such devices as homemade telephone boxes. They are often much more extroverted than their computer equivalents.

Phreaks have been known to create world-wide conference calls that run for hours (on someone else's bill, of course). When someone has to drop out, they call up another phreaks to join in. Hackers come from a wide variety of odd subcultures, with a variety of languages, motives and values. The most sensationalized of these is the " cyberpunk" group. The cyberpunk FAQ (Frequently Asked Questions list) states: 2. What is cyberpunk, the subculture?

Spurred on by cyberpunk literature, in the mid- 1980 's certain groups of people started referring to themselves as cyberpunk, because they correctly noticed the seeds of the fictional 'techno-system' in Western society today, and because they identified with the marginalized characters in cyberpunk stories. Within the last few years, the mass media has caught on to this, spontaneously dubbing certain people and groups 'cyberpunk'. Specific subgroups which are identified with cyberpunk are: Hackers, Crackers, and Phreaks: 'Hackers' are the 'wizards' of the computer community; people with a deep understanding of how their computers work, and can do things with them that seem 'magical'. 'Crackers' are the real-world analogues of the 'console cowboys' of cyberpunk fiction; they break in to other people's computer systems, without their permission, for illicit gain or simply for the pleasure of exercising their skill. 'Phreaks' are those who do a similar thing with the telephone system, coming up with ways to circumvent phone companies' calling charges and doing clever things with the phone network. All three groups are using emerging computer and telecommunications technology to satisfy their individualist goals. Cypherpunks: These people think a good way to bollix 'The System' is through cryptography and crypto systems. They believe widespread use of extremely hard- to-break coding schemes will create "...


Free research essays on topics related to: computer crime, unauthorized access, telephone network, amp t, computer system

Research essay sample on Computer Crime Computer System

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com